General

  • Target

    hwidspoofer.exe

  • Size

    75.4MB

  • Sample

    241204-s5pybsvphj

  • MD5

    eb0cf1a95ffd1d314b96ccb0136bf748

  • SHA1

    dbaff8d30e9fb023550f89fbba7784ca5e3ab9ff

  • SHA256

    f82c91241d92db6e4b9843dcee5e164d13ec25903827fe80cb9848acb1a4e745

  • SHA512

    ee31550d5da75e0f5ac164f7c3283012d2a9991f146f8090ae3c55d0cecbc6b0a375448175248c9e15aea1c09ea2e05558ba978e058a7ec7175f24165b4b9cfa

  • SSDEEP

    1572864:Y08VlFW2omcSk8IpG7V+VPhqerE7WoclKTiY4MHHLeqPNLtDYN0sZsfV0:7KTxomcSkB05awehocMEMHVLtUN0s0

Malware Config

Targets

    • Target

      hwidspoofer.exe

    • Size

      75.4MB

    • MD5

      eb0cf1a95ffd1d314b96ccb0136bf748

    • SHA1

      dbaff8d30e9fb023550f89fbba7784ca5e3ab9ff

    • SHA256

      f82c91241d92db6e4b9843dcee5e164d13ec25903827fe80cb9848acb1a4e745

    • SHA512

      ee31550d5da75e0f5ac164f7c3283012d2a9991f146f8090ae3c55d0cecbc6b0a375448175248c9e15aea1c09ea2e05558ba978e058a7ec7175f24165b4b9cfa

    • SSDEEP

      1572864:Y08VlFW2omcSk8IpG7V+VPhqerE7WoclKTiY4MHHLeqPNLtDYN0sZsfV0:7KTxomcSkB05awehocMEMHVLtUN0s0

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks